Thoughts From Our Staff

Passwordless-Path

Get Your Organization Ready to Leave Passwords Behind

So many passwords, such a headache and waste of keystrokes…I’m ready to drop these things completely. Chances are, you or your employees have felt this way to one extent or another. If you are a CISO or security manager, you’ve probably gone even further and thought to yourself: there’s got to be a more secure…

Microsoft-cyber-crime

Infused Innovations Launches Managed Infused Threat Protection

Infused Innovations is announcing their new managed Infused Threat Protection (ITP) service that is replacing their Secqur Aether platform. Along with the rebrand, Infused Innovations is adding the recently released Microsoft Azure Sentinel service to their arsenal. Azure Sentinel provides a cloud-native security information event management (SIEM) and security orchestration automation and response (SOAR) solution…

Identity_diagram

Start Moving to Modern Authentication

Microsoft has announced that it will end support for Basic Authentication in Exchange Online next year, on October 13, 2020. Various protocols will change their authentication methods, including Exchange Active Sync (EAS), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), and Remote PowerShell (RPS) in Exchange Online. Applications that use any of these APIs/protocols will be…

IncidentResponse

Writing an Effective Security Incident Response Procedure

If you’re a chief information security officer, you need to write security incident response procedure documents (I’ll call them SIRPdocs). And your job can depend on the ability to write them well—Gartner suggests that up to 75% of CISOs who suffered publicly documented security breaches without well-tested security plans may have lost their jobs in…

PowerAutomate-Workflow

Microsoft Flow is Now Power Automate

Automation is a big topic today in the tech world. If you’ve heard of Microsoft Flow, that may be thanks to its robotic process automation (RPA) capabilities and how it can connect legacy and modern applications within a business. As announced at the Ignite conference 2019, Microsoft Flow is now called Power Automate, in line…

WVD-Services-Diagram

Step-by-Step Guide to Install FSLogix on WVD

With the recent GA of Windows Virtual Desktop (WVD) Microsoft has extended its ability to deliver important endpoint capabilities to users anywhere in the world. Designed to improve upon the standard Windows Virtual Desktop capabilities, installing FSLogix on WVD can enhance and simplify these sorts of non-persistent environments. Benefits of Installing FSLogix on WVD Maintain…

BT_NonProfit_Disability

Microsoft 365 Plans for Non-Profits

Non-profit organizations often underestimate their risk of cyber attacks. This leaves them more vulnerable than they realize and oftentimes an easier target than other kinds of companies. Yet failing to prioritize cybersecurity could have major effects—data losses, financial catastrophe, damaged reputation or even the need to shut down the organization altogether. Studies show that non-profits…

Microsoft-Ignite_

Microsoft Ignite 2019’s Top Announcements

Microsoft Ignite is the annual conference where the tech giant gets to show off its exciting new developments. The company’s many announcements are of interest to IT professionals, developers, and big Microsoft fans. We love hearing about new streamlined improvements and innovative previews offered. This year’s conference seemed to present more news than ever—Microsoft provided…

Autopilot

Windows Autopilot for Workstation Imaging

The typical process of acquiring new devices and configuring them for company use is a bit of a headache. It goes something like this: your IT admin gets the devices, wipes them of their default settings, re-images them with custom images using Ghost or Acronis, obtains drivers, configures the relevant applications and settings, and finally…

Bluekeep

PSA: Patch BlueKeep and DejaBlue Now

Microsoft issued two of the same warnings to its users this year: patch BlueKeep and DejaBlue on your vulnerable Windows systems. When the first and then the second warning went largely unheeded, the National Security Agency (NSA) published a rare advisory on June 4 urging Microsoft Windows administrators to update their operating systems. An NSA warning of…

Intune-MAM-Diagram

MAM and Intune: Sandboxing Corporate Data

In line with all of Microsoft’s products, Intune is designed to deliver top security for corporate data while optimizing user productivity. In this case, we’re focusing specifically on mobile devices and their apps. Intune is Microsoft’s Enterprise Mobility + Security (EMS) component that manages that area. Let’s take a look at the difference between mobile…

Minecraft

Microsoft 365 Plans for Education

Educational institutions face the cybersecurity risks of other organizations and more. Because of certain factors inherent to the nature of educational places, these institutions are at a greater security risk. Limited budgets, privacy concerns, intellectual property, and specific compliance regulations create an atmosphere that’s different from most organizations. The multiplicity of college departments makes for…